PENETRATION TESTING
RISK STRATEGY: 8 Reasons You Need A Security Penetration Test. One of the biggest challenges in IT security is determining whether the tools and configurations you have in place are giving your organization the level of security you require. Here’s how penetration testing can help. Read the rest
[INFORMATIONWEEK.COM]
VULNERABILITIES: Hacking A Penetration Tester. How even a pen test conducted by a security pro can be hacked by a determined attacker looking for a way to its target. Find out more
[DARKREADING.COM]
CYBERWAR: The DNC Hack and Dump Is What Cyberwar Looks Like. Elections are critical infrastructure that should be hands-off for governments. What occurred with the recently disclosed breach of the Democratic National Committee servers, and the dumping of stolen data on a WordPress site, is more than an act of cyber espionage or harmless mischief. It meets the definition of an act of cyberwar, and the US government should respond as such. Read more
[ARSTECHNICA.COM]
SECURITY FLAWS: Necessity is the Mother of the ‘Rugged DevOps’ Movement. No matter how good your perimeter security is, experts agree: Your system has been breached, whether you know it or not. The costs of security flaws – cybersecurity expert Joe Franscella calls them “The Five Horsemen of the Internet Apocalypse: Scam, Extortion, Embarrassment, Theft and Death” – are enormous. So why don’t we consider security a first-class citizen in DevOps? Read more
[SDTIMES.COM]
==========
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems June 2016 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-june-2016.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.
==========